Charles-E. Prevost (@ceprevost) 's Twitter Profile
Charles-E. Prevost

@ceprevost

Jack of all trades, Master of some //
#RedTeaming, #Forensics, #IncidentResponse, #Malware and #Infosec

ID: 1656703806

calendar_today09-08-2013 02:51:24

795 Tweet

406 Takipçi

479 Takip Edilen

b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

I am releasing DiscerningFinch, a small toolkit to generate keyed -> encrypted wrappers for .NET binaries. DiscerningFinch itself doesn't know the key and will try to brute force decrypt the inner binary based on OS constants. More details on GitHub => github.com/FuzzySecurity/…

I am releasing DiscerningFinch, a small toolkit to generate keyed -> encrypted wrappers for .NET binaries. DiscerningFinch itself doesn't know the key and will try to brute force decrypt the inner binary based on OS constants. More details on GitHub => github.com/FuzzySecurity/…
Nick Carr (@itsreallynick) 's Twitter Profile Photo

Critical new defenses for OAuth consent phishing: • ✅ Publisher verification [pic 1] • 📋 Customizable app consent policies [pic 2] • 🚷 Globally disallowing user consent to new multi-tenant apps from unverified publishers (on Nov 8) 👉🏼📰 Details: techcommunity.microsoft.com/t5/azure-activ…

Critical new defenses for OAuth consent phishing:
• ✅ Publisher verification [pic 1]
• 📋 Customizable app consent policies [pic 2]
• 🚷 Globally disallowing user consent to new multi-tenant apps from unverified publishers (on Nov 8)

👉🏼📰 Details: techcommunity.microsoft.com/t5/azure-activ…
samy kamkar (@samykamkar) 's Twitter Profile Photo

I've released NAT Slipstreaming, a spooky new technique that allows an attacker to remotely access any TCP/UDP service bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website. samy.pl/slipstream/ Happy Halloween!

I've released NAT Slipstreaming, a spooky new technique that allows an attacker to remotely access any TCP/UDP service bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website. samy.pl/slipstream/ Happy Halloween!
Maddie Stone (@maddiestone) 's Twitter Profile Photo

With 22 0-day exploits, 2020 has officially surpassed 2019 in number of 0-days detected as exploited in-the-wild. As a reminder, Project Zero tracks all publicly known itw 0-day exploits going back to 2014 here: docs.google.com/spreadsheets/d…

Steve YARA Synapse Miller (@stvemillertime) 's Twitter Profile Photo

Eight years ago Mandiant (part of Google Cloud) made the cover of the The New York Times with its APT1 report. Espionage is a tale as old as time, but I believe this report and this news coverage changed the private sector and forged a new public conversation on the topic. We are all still riding this wave.

Eight years ago <a href="/Mandiant/">Mandiant (part of Google Cloud)</a> made the cover of the <a href="/nytimes/">The New York Times</a> with its APT1 report. Espionage is a tale as old as time, but I believe this report and this news coverage changed the private sector and forged a new public conversation on the topic. We are all still riding this wave.
James Coote (@jkcoote) 's Twitter Profile Photo

Just added `dump` to SharpSphere for dumping LSASS from any powered on Windows VM, without needing guest credentials. DC hosted on vSphere? Your vCenter users are DA. Guide: jamescoote.co.uk/Dumping-LSASS-… Code: github.com/JamesCooteUK/S…

Just added `dump` to SharpSphere for dumping LSASS from any powered on Windows VM, without needing guest credentials. DC hosted on vSphere? Your vCenter users are DA.

Guide: jamescoote.co.uk/Dumping-LSASS-…
Code: github.com/JamesCooteUK/S…
Regina Elwell (@reginaelwell) 's Twitter Profile Photo

#MTrends 2021 is out! Level-set your perspectives of industry trends with metrics generated from hundreds of frontline incident response investigations. #ByTheNumbers Get your copy here: fireeye.com/mtrends

#MTrends 2021 is out! Level-set your perspectives of industry trends with metrics generated from hundreds of frontline incident response investigations. #ByTheNumbers 

Get your copy here: fireeye.com/mtrends
Doug Bienstock (@doughsec) 's Twitter Profile Photo

🚨🚨 New technique to steal AD FS secrets over the network. Defenders need to block internal traffic to AD FS servers over port 80 now! Read more: fireeye.com/blog/threat-re… shoutout to Dr. Nestori Syynimaa who had the same though to look into AD FS replication and all his great work! 1/3

Jake Valletta (@jake_valletta) 's Twitter Profile Photo

At long last - Some research a few of us did in late 2020/early 2021 is live! Check out how we found a way to abuse a P2P protocol to compromise A LOT of smart devices! fireeye.com/blog/threat-re…

Aaron Stephens (@x04steve) 's Twitter Profile Photo

Did you know that Microsoft Office documents are actually just ZIP files? It makes for some neat detection opportunities. Today I'm happy to share one that we use on Mandiant (part of Google Cloud) #AdvancedPractices. Read all about it, and get your shiny new tool here: fireeye.com/blog/threat-re…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

CyberSecurity should never be considered a separate field but a specialisation area within IT It's like surgery. You can't be a good surgeon without fundamental knowledge of the anatomy, organ functions and illnesses. Without that knowledge, you're just a butcher.

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

Working with a hex-editor is a very important #DFIR skill. I'm releasing the videos I recorded on how to use the 010 Editor for FREE. These videos were done for our Cyber 5W "Working with Files" course. Your feedback is very important to us! youtube.com/playlist?list=…

Joseph Cox (@josephfcox) 's Twitter Profile Photo

New: tried out the newer OMG Cables, one being a Lightning to USB-C cable that looks identical to the real Apple one. But it silently sends everything you're typing on your keyboard to an attacker's device potentially a mile away vice.com/en/article/k78…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Get excited! #FLAREOn8 kicks off this Friday 8PM ET/5 PM PT at flare-on[dot]com. This year’s contest will consist of 10 challenges and feature a variety of formats, including Windows, Linux, and JavaScript. Learn more: feye.io/3zIuwnG

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

Looks like definitely an interesting report, but I can't help but think how "living off the land" is just like Unix hacking in the 90's... I guess Windows systems now have enough useful utilities built-in for attackers to not need to bring their own stack anymore :).

Alyssa (she/her) (@ramen0x3f) 's Twitter Profile Photo

🚨🚨New Tools, Rules, and MORE! 🚨🚨 Today I'm releasing a toolset to hunt for deserialization exploitation by programmatically generating and testing rules: github.com/mandiant/heyse… Check out this blog for a (very) thorough walkthrough of my R&D process mandiant.com/resources/hunt…